Common TCP/IP Protocols Flashcards Preview

Test Out Network + > Common TCP/IP Protocols > Flashcards

Flashcards in Common TCP/IP Protocols Deck (32):
1

Protocol

A set of standards for communication between network hosts

2

Protocol suite

A group of protocols intended to be used together

3

Name Web services protocols

* Hypertext Transfer Protocol (HTTP)
* HTTP over SSL (HTTPS)

4

Hypertext Transfer Protocol (HTTP)

* Is used by web browsers and web servers o exchange files (such as web pages) through the World Wide Web and intranets.
* Can be described as an information requesting and responding protocol.
* Is typically used to request and send web documents, but is also used as the protocol for communication between agents using different TCP/IP protocols

5

HTTP over SSL (HTTPS)

Is a secure form of HTTP that uses SSL to encrypt data before it is transmitted

6

Name Security protocols

* Secure Sockets Layer (SSL)
* Transport Layer Security (TLS)

7

Secure Layer Security (SSL)

* Secures messages being transmitted on the Internet
* Uses RSA for authentication and encryption
* Web browsers use SSL to ensure safe web transactions

8

Transport Layer Security (TLS)

* Ensure the messages being transmitted on the Internet are private and tamper proof.
* TLS is implemented in two protocols
* TLS Record provides connection security with encryption (with DES for example)
* TLS Handshake provides mutual authentication and choice of encryption method

9

Name the file transfer protocols

* File Transfer Protocol (FTP)
* Trivial File Transfer Protocol (TFTP)
* Secure File Transfer Protocol (SFTP)
* Secure Copy (SCP)

10

File Transfer Protocol (FTP)

* Generic method of transferring files
* Protect access to files by requiring usernames and passwords, and allows file transfer between dissimilar computer systems
* Can transfer both binary and text files including HTML to another host
**** FTP does not use encryption. All data are sent over the network in clear text ****

11

Trivial File Transfer Protocol (TFTP)

* Does not provide user authentication or error detection
* Used when files need to be transferred between systems quickly
* Since it does not perform error detection TFTP is faster than FTP but is susceptible to transmission errors

12

Secure File Transfer Protocol (SFTP)

* Uses SSH to secure data transfer
* SSH ensures that SFTP transmission use encrypted commands and data

13

Secure Copy (SCP)

* Used to securely transfer files between systems

14

Name Email Protocols

* Simple Mail Transfer Protocol (SMTP)
* Post Office Protocol 3 (POP3)
* Internet Message Access Protocol version4 (IMAP4)

15

Simple Mail Transfer (SMTP)

* Is used to route electronic mail through the internetwork
* Is used between mail severs for sending and relaying mail
* Is used by all email clients to send mail
* by some email client programs, such as Outlook for receiving mail from an Exchange server

16

Post Office Protocol 3 (POP3)

* Is used to retrieve email from a remote server and download it to a local client over TCP/IP connection
**** An email client that uses POP3 for receiving mail uses SMTP for sending mail ****

17

Internet Message Access Protocol version4 (IMAP4)

* Designed to enable users to access their mail for various locations, with out the need to transfer messages or files back and forth between computers
* Messages remain on the remote mail server and are not automatically downloaded to a client system
**** An email client that uses IMAP4 for receiving mail uses SMTP for sending mail ****

18

Network Services Protocols

* Dynamic Host Configuration Protocol (DHCP)
* Domain Name System (DNS)
* Network Time Protocol (NTP)
* Lightweight Directory Access Protocol (LDAP)

19

Dynamic Host Configuration Protocol (DHCP)

* Is used to automatically assign addresses and other configuration parameters to network hosts
* Using a DHCP server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host

20

Domain Name System (DNS)

* A distributed system throughout the internetwork that provides addresses and name resolution
* EX www.mydomain.com would be mapped to a specific IP address

21

Network Time Protocol (NTP)

* Used to communicate time synchronization information between systems on a network

22

Lightweight Directory Access Protocol (LDAP)

* Used to search, retrieve data from, and update a directory service
* This protocol follows a client/server model.
* One or more LDAP servers contain the directory data
* The client connects to an LDAP Server to make a directory service request

23

Network Management Protocols

* Simple Network Management Protocol (SNMP)
* Remote Terminal Emulation (Telnet)
* Secure Shell (SSL)

24

Simple Network Management Protocol (SNMP)

* Designed for managing complex networks
* Lets network hosts exchange configuration and status information.
* This information can be gathered by management software and is used to monitor and manage the network

25

Remote Terminal Emulation (Telnet)

* Allows a computer to remotely access the console of a computer system somewhere else in the network
* Was used for remote management task but rarely used today
* Does not use encryption - recommended to use a secure alternative to Telnet for remote management task, such as SSH

26

Secure Shell (SSH)

* Allows for secure interactive control of remote systems
* Uses RSA public key cryptography for both connection and authentication
* Uses the IDEA algorithm for encryption by default, but is can use Blowfish and DES
* Is a secure and preferred alternative to Telnet

27

Transport Protocols

* Transmission Control Protocol (TCP)
* User Datagram Protocol (UDP)

28

Transmission Control Protocol (TCP)

* Provides services that ensure accurate and timely delivery of network communication between two hosts
* Sequencing of data packets
* Flow control
* Error checking
* Acknowledgement of packets sent
* Retransmission of lost packets

29

User Datagram Protocol (UDP)

* Host to host protocol like TCP but
* Doesn't acknowledge each packet transmitted
* Doesn't allow for retransmission of lost packets
* That reduces overhead allowing for faster communications
* Ideal of streaming audio and video
* Speed come at the expense of possible errors or data loss

30

Control Protocols

* Internet Control Message Protocol (ICMP)
* Internet Group Membership Protocol (IGMP)

31

Internet Control Message Protocol (ICMP)

* Works closely with IP to prevent errors and control information by allowing host to exchange packet status information
* Ping and traceroute use ICMP message to check network connectivity
* ICMP also works with IP to send notices
* When destinations are unreachable
* Which route and hops a packets takes through a network
* Whether devices can communicate across the network

32

Internet Group Membership Protocol (IGMP)

* Defines host groups
* All group members can receive broadcast messages (multicasts) intended for the group
* Multicast groups can be composed of devices within the same network or across networks (connected with a router)